Sciweavers

348 search results - page 47 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
149
Voted
RTCSA
2007
IEEE
15 years 9 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
104
Voted
APCHI
1998
IEEE
15 years 7 months ago
A Framework for Event-Driven Demonstration based on the Java Toolkit
An event-driven demonstration is to show the behavior of an application by re-executing the captured events. It is used to provide help regarding how an application works because ...
Motoki Miura, Jiro Tanaka
124
Voted
AINA
2007
IEEE
15 years 10 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
137
Voted
WS
2004
ACM
15 years 9 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
162
Voted
WWW
2010
ACM
15 years 10 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...